WAF

Are Application Testing Tools Still Relevant with Self Learning WAFs?

We all want to secure our applications. This task is becoming harder by the day as our applications constantly change multiple times per week,...

Access to Applications Based on a « Driving License » Model

More and more countries are modifying their policies with a new “driving license” model. With a classic license model, drivers can be caught frequently; they...

WAFs Should Do A Lot More Against Current Threats Than Covering OWASP Top 10

Looking in the rearview mirror The application threat landscape has rapidly evolved. For years, users consumed applications over the internet using the common tool -...

Building Tier 1 IP Transit – What’s Involved and Why Do It?

Not all internet connectivity is created equal. Many Tier 2 and Tier 3 ISPs, cloud service providers and data integrators consume IP Transit sourced...

Orchestrating Flows for Cyber

There is a great scene in the movie Victor, Victoria, where the character played by James Garner decides it’s time to mix things up...

Marrying the Business Need With Technology, Part 3: Re-aggregating the Tools

In part one of this blog series we discussed how there is oftentimes a lack of knowledge when it comes to infrastructure technology and...

Application Delivery and Application Security Should be Combined

Most businesses have multi-function printers that can fax, scan, and copy.  In our roles, we are multi-functional as well.  A network architect is often...

Taking Stock of Application-Layer Security Threats

The financial services industry is, by its very nature, inherently risk adverse. The sheer volume of transactional data moving through networks can be staggering...

Retail & Web Application Security: What Application-Layer Security Threats Are in Store for Retailers

The retail industry is undergoing a transformative period as the “empowered” consumer, driven by technological advances and breakthroughs, impacts how retailers market, communicate and...

Are Your Medical Records Safe? NO.

Radware’s Web Application Security Report finds security flaws in the healthcare industry What do healthcare institutions, insurance companies, hospitals, pharmaceuticals and manufacturers of medical equipment...

Healthcare & Web Application Security: A Prescriptive Look at Application-Layer Security Risks

The healthcare sector consists of a wide number of segments: payers, such as insurance companies; providers such as hospitals and doctors; and manufacturers, both...

Web Application Security in a Digitally Connected World

Apps control our lives today. We pay our bills, do our shopping, communicate with our doctors, buy our groceries, order a taxi, and even...

Must Read

Navigating the Bot Ecosystem

Bots touch virtually every part of our digital lives -- and now account for over half of all web traffic.

A Buyer’s Guide to Bot Management

Web-based bots are a critical part of your business’s digital presence.

How Hard Is It to Build a Botnet?

While working on Radware’s Ultimate Guide to Bot Management, I began wondering what would it take to build a botnet.

Layer 7 Attack Mitigation

The DDoS world hits new records lately, with the attacks on KrebsOnSecurity.com and later on OVH and Dyn reached a bandwidth of more than...

New DemonBot Discovered

Are you using Hadoop for data analytics? If so, know that a new bot is targeting Hadoop clusters with the intention of performing DDoS...